Skip to content

Commit cc4067a

Browse files
committed
s/tcti/ct
1 parent 7d9b4ad commit cc4067a

14 files changed

+11
-3326
lines changed

ctlog.go

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ import (
2525
"strings"
2626
"time"
2727

28-
"github.com/transparency-dev/static-ct/internal/tcti"
28+
"github.com/transparency-dev/static-ct/internal/ct"
2929
"github.com/transparency-dev/static-ct/internal/x509util"
3030
"github.com/transparency-dev/static-ct/storage"
3131
)
@@ -62,7 +62,7 @@ type ChainValidationConfig struct {
6262
NotAfterLimit *time.Time
6363
}
6464

65-
// systemTimeSource implements tcti.TimeSource.
65+
// systemTimeSource implements ct.TimeSource.
6666
type systemTimeSource struct{}
6767

6868
// Now returns the true current local time.
@@ -74,7 +74,7 @@ var sysTimeSource = systemTimeSource{}
7474

7575
// newChainValidator checks that a chain validation config is valid,
7676
// parses it, and loads resources to validate chains.
77-
func newChainValidator(cfg ChainValidationConfig) (tcti.ChainValidator, error) {
77+
func newChainValidator(cfg ChainValidationConfig) (ct.ChainValidator, error) {
7878
// Load the trusted roots.
7979
if cfg.RootsPEMFile == "" {
8080
return nil, errors.New("empty rootsPemFile")
@@ -98,7 +98,7 @@ func newChainValidator(cfg ChainValidationConfig) (tcti.ChainValidator, error) {
9898
// Filter which extended key usages are allowed.
9999
if cfg.ExtKeyUsages != "" {
100100
lExtKeyUsages := strings.Split(cfg.ExtKeyUsages, ",")
101-
extKeyUsages, err = tcti.ParseExtKeyUsages(lExtKeyUsages)
101+
extKeyUsages, err = ct.ParseExtKeyUsages(lExtKeyUsages)
102102
if err != nil {
103103
return nil, fmt.Errorf("failed to parse ExtKeyUsages: %v", err)
104104
}
@@ -108,13 +108,13 @@ func newChainValidator(cfg ChainValidationConfig) (tcti.ChainValidator, error) {
108108
// Filter which extensions are rejected.
109109
if cfg.RejectExtensions != "" {
110110
lRejectExtensions := strings.Split(cfg.RejectExtensions, ",")
111-
rejectExtIds, err = tcti.ParseOIDs(lRejectExtensions)
111+
rejectExtIds, err = ct.ParseOIDs(lRejectExtensions)
112112
if err != nil {
113113
return nil, fmt.Errorf("failed to parse RejectExtensions: %v", err)
114114
}
115115
}
116116

117-
cv := tcti.NewChainValidator(roots, cfg.RejectExpired, cfg.RejectUnexpired, cfg.NotAfterStart, cfg.NotAfterLimit, extKeyUsages, rejectExtIds)
117+
cv := ct.NewChainValidator(roots, cfg.RejectExpired, cfg.RejectUnexpired, cfg.NotAfterStart, cfg.NotAfterLimit, extKeyUsages, rejectExtIds)
118118
return &cv, nil
119119
}
120120

@@ -126,19 +126,19 @@ func NewLogHandler(ctx context.Context, origin string, signer crypto.Signer, cfg
126126
if err != nil {
127127
return nil, fmt.Errorf("newCertValidationOpts(): %v", err)
128128
}
129-
log, err := tcti.NewLog(ctx, origin, signer, cv, cs, sysTimeSource)
129+
log, err := ct.NewLog(ctx, origin, signer, cv, cs, sysTimeSource)
130130
if err != nil {
131131
return nil, fmt.Errorf("newLog(): %v", err)
132132
}
133133

134-
opts := &tcti.HandlerOptions{
134+
opts := &ct.HandlerOptions{
135135
Deadline: httpDeadline,
136-
RequestLog: &tcti.DefaultRequestLog{},
136+
RequestLog: &ct.DefaultRequestLog{},
137137
MaskInternalErrors: maskInternalErrors,
138138
TimeSource: sysTimeSource,
139139
}
140140

141-
handlers := tcti.NewPathHandlers(ctx, opts, log)
141+
handlers := ct.NewPathHandlers(ctx, opts, log)
142142
mux := http.NewServeMux()
143143
// Register handlers for all the configured logs.
144144
for path, handler := range handlers {

internal/tcti/chain_validation.go

Lines changed: 0 additions & 315 deletions
This file was deleted.

0 commit comments

Comments
 (0)